skip to main content
10.1145/2556288.2557102acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Let's do it at my place instead?: attitudinal and behavioral study of privacy in client-side personalization

Published:26 April 2014Publication History

ABSTRACT

Many users welcome personalized services, but are reluctant to provide the information about themselves that personalization requires. Performing personalization exclusively at the client side (e.g., on one's smartphone) may conceptually increase privacy, because no data is sent to a remote provider. But does client-side personalization (CSP) also increase users' perception of privacy?

We developed a causal model of privacy attitudes and behavior in personalization, and validated it in an experiment that contrasted CSP with personalization at three remote providers: Amazon, a fictitious company, and the "Cloud". Participants gave roughly the same amount of personal data and tracking permissions in all four conditions. A structural equation modeling analysis reveals the reasons: CSP raises the fewest privacy concerns, but does not lead in terms of perceived protection nor in resulting self-anticipated satisfaction and thus privacy-related behavior. Encouragingly, we found that adding certain security features to CSP is likely to raise its perceived protection significantly. Our model predicts that CSP will then also sharply improve on all other privacy measures.

References

  1. Ahmed, R. and Ho, S. Y. Privacy Concerns of Users for Location-Based Mobile Personalization. CONF-IRM 2011 Proceedings, (2011), Paper 10.Google ScholarGoogle Scholar
  2. Ankolekar, A. and Vrandecié, D. Kalpana - enabling client-side web personalization. 17th ACM conference on hypertext and hypermedia, ACM (2008), 21--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Awad, N.F. and Krishnan, M.S. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MISQ 30, 1 (2006), 13--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Baron, R. M. and Kenny, D. A. The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. J Pers Soc Psychology 51, 6 (1986), 1173--1182.Google ScholarGoogle ScholarCross RefCross Ref
  5. Casaló, L. V., Flavián, C., and Guinalíu, M. The role of security, privacy, usability and reputation in the development of online banking. Online Information Review 31, 5 (2007), 583--603.Google ScholarGoogle ScholarCross RefCross Ref
  6. Cassel, L. N. and Wolz, U. Client Side Personalization. DELOS Workshop: Personalisation and Recommender Systems in Digital Libraries, (2001), 8--12.Google ScholarGoogle Scholar
  7. Chellappa, R. K. and Sin, R. Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma. Information Technology and Management 6, 2-3 (2005), 181--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chellappa, R. K. Consumers' Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security. Emory Univ., Atlanta, GA, 2008.Google ScholarGoogle Scholar
  9. Chin, E., Felt, A. P., Sekar, V., Wagner, D. Measuring user confidence in smartphone security and privacy. 8th Symp. on Usable Privacy and Security, (2012), 1:1--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Coroama, V. and Langheinrich, M. Personalized Vehicle Insurance Rates: A Case for Client-Side Personalization in Ubiquitous Computing. PEP06, CHI Workshop on Privacy-Enhanced Personalization, (2006), 56--59.Google ScholarGoogle Scholar
  11. Coroama, V. The Smart Tachograph: Individual Accounting of Traffic Costs and Its Implications. In K.P. Fishkin, B. Schiele, P. Nixon, A. Quigley, eds., Pervasive Computing: 4th Int'l Conf. Springer 2006, 135--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Davidson, D. and Livshits, B. MoRePriv: Mobile OSWide Application Personalization. Microsoft Research, Redmond, WA, 2012.Google ScholarGoogle Scholar
  13. Fredrikson, M. and Livshits, B. RePriv: Re-imagining Content Personalization and In-browser Privacy. IEEE Symposium on Security and Privacy, (2011), 131--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Van de Garde-Perik, E., Markopoulos, P., de Ruyter, B., Eggen, B., and Ijsselsteijn, W. Investigating Privacy Attitudes and Behavior in Relation to Personalization. Social Science Computer Review 26, 1 (2008), 20--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Gerber, S., Fry, M., Kay, J., Kummerfeld, B., Pink, G., Wasinger, R. PersonisJ: Mobile, Client-Side User Modelling. In P. Bra, A. Kobsa, D. Chin, eds User Modeling, Adaptation and Personalization. Springer 2010, 111--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Guha, S., Cheng, B., and Francis, P. Privad: practical privacy in online advertising. 2011 USENIX conf. on networked systems design and implementation, paper 13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Ion, I., Sachdeva, N., Kumaraguru, P., and Čapkun, S. Home is safer than the cloud!: privacy concerns for consumer cloud storage. 7th Symposium on Usable Privacy and Security, ACM (2011), 13:1--13:20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Juels, A. Targeted Advertising... and Privacy Too. In D. Naccache, ed., Topics in Cryptology - CT-RSA 2001. Springer, Berlin/Heidelberg, 2001, 408--424. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Kanich, C., Checkoway, S., and Mowery, K. Putting out a HIT: crowdsourcing malware installs. 5th USENIX conference on offensive technologies, (2011), 9:1--9:10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kline, R. B. Principles and Practice of Structural Equation Modeling. Guilford Press, 2011.Google ScholarGoogle Scholar
  21. Knijnenburg, B. P., Kobsa, A., and Jin, H. Dimensionality of information disclosure behavior. Int J HumanComputer Studies 71, 12 (2013), 1144--1162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Knijnenburg, B. P. and Kobsa, A. Making Decisions about Privacy: Information Disclosure in ContextAware Recommender Systems. ACM Transactions on Interactive Intelligent Systems 3, 3 (2013), 20:1--20:23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Knijnenburg, B. P. and Kobsa, A. Helping users with information disclosure decisions: potential for adaptation. ACM IUI conference (2013), 407--416. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Knijnenburg, B. P., Willemsen, M. C., Gantner, Z., Soncu, H., and Newell, C. Explaining the user experience of recommender systems. User Modeling and User-Adapted Interaction 22, 4-5 (2012), 441--504. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Knijnenburg, B. P., Willemsen, M. C., and Hirtbach, S. Receiving Recommendations and Providing Feedback: The User-Experience of a Recommender System. In F. Buccafurri and G. Semeraro, eds., E-Commerce and Web Technologies. Springer, 2010, 207--216.Google ScholarGoogle Scholar
  26. Kobsa, A., Koenemann, J., Pohl, W. Personalized Hypermedia Presentation Techniques for Improving Customer Relationships. Knowl Eng Rev 16, 2 2001, 111--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Kobsa, A. and Teltzrow, M. Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing Behavior. In D. Martin and A. Serjantov, eds., Privacy Enhancing Technologies: Springer, 2005, 329--343. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kobsa, A. Privacy-Enhanced Web Personalization. In P. Brusilovsky, A. Kobsa and W. Nejdl, eds., The Adaptive Web: Methods and Strategies of Web Personalization. Springer, 2007, 628--670. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Li, T. and Unger, T. Willing to pay for quality personalization? Trade-off between quality and privacy. Eur J of Information Systems 21, 6 (2012), 621--642.Google ScholarGoogle ScholarCross RefCross Ref
  30. Lukaszewski, K. M., Stone, D. L., and Stone-Romero, E. F. The Effects of the Ability to Choose the Type of Human Resources System on Perceptions of Invasion of Privacy and System Satisfaction. Journal of Business and Psychology 23, 3-4 (2008), 73--86.Google ScholarGoogle ScholarCross RefCross Ref
  31. MacKinnon, D. Introduction to Statistical Mediation Analysis. CRC Press, 2007.Google ScholarGoogle Scholar
  32. Mayer, R. C., Davis, J. H., and Schoorman, F. D. An Integrative Model Of Organizational Trust. Academy of Management Review 20, 3 (1995), 709--734.Google ScholarGoogle ScholarCross RefCross Ref
  33. Miyazaki, A. D. and Fernandez, A. Internet Privacy and Security: An Examination of Online Retailer Disclosures. J Public Policy & Marketing 19, 1 (2000), 54--61.Google ScholarGoogle ScholarCross RefCross Ref
  34. Mossholder, K. W., Giles, W. F., and Wesolowski, M. A. Information privacy and performance appraisal: An examination of employee perceptions and reactions. Journal of Business Ethics 10, 2 (1991), 151--156.Google ScholarGoogle ScholarCross RefCross Ref
  35. Mulligan, D. and Schwartz, A. Your Place or Mine?: Privacy Concerns and Solutions for Server and Client-Side Storage of Personal Information. Tenth conference on Computers, Freedom and Privacy, (2000), 81--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., and Beznosov, K. Understanding Users' Requirements for Data Protection in Smartphones. ICDEW 2012, 228--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Newman, G. H. and Enscoe, C. J. System and method for providing client side personalization of content of web pages and the like. 2000. http://www.google.com/patents?id=VI0EAAAAEBAJ.Google ScholarGoogle Scholar
  38. Norberg, P. A., Horne, D. R., Horne, D. A. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. J Consum Aff 41, 1 (2007), 100--126.Google ScholarGoogle ScholarCross RefCross Ref
  39. Oulasvirta, A. and Sumari, L. Mobile kits and laptop trays: managing multiple devices in mobile information work. CHI 2007, 1127--1136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Pirim, T., James, T., Boswell, K., Reithel, B., and Barkhi, R. An Empirical Investigation of an Individual's Perceived Need for Privacy and Security. Int'l Journal of Information Security and Privacy 2, 1 (2008), 42--53.Google ScholarGoogle Scholar
  41. Ponemon. 2012 Most Trusted Companies for Privacy. Ponemon Institute, 2013. http://www.ponemon.org/local/upload/file/2012%20MTC%20Report%20FINAL.pdfGoogle ScholarGoogle Scholar
  42. Schmidt, E. 36h MacTaggart Lecture. 2011. http:// www.youtube.com/watch?v=hSzEFsfc9Ao#t=1224s.Google ScholarGoogle Scholar
  43. Shen, X., Tan, B., and Zhai, C. Implicit user modeling for personalized search. ACM ICIKM 2005, 824--831. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Shin, D.-H. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers 22, 5 (2010), 428--438. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Smith, H. J., Dinev, T., and Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly 35, 4 (2011), 989--1016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Solove, D. J. A Taxonomy of Privacy. University of Pennsylvania Law Review 154, 3 (2006), 477--564.Google ScholarGoogle ScholarCross RefCross Ref
  47. Spiekermann, S., Grossklags, J., Berendt, B. E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. ACM EC 2001, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Teltzrow, M. and Kobsa, A. Impacts of User Privacy Preferences on Personalized Systems: a Comparative Study. In C.-M. Karat, J. Blom and J. Karat, eds., Designing Personalized User Experiences for eCommerce. Kluwer, 2004, 315--332. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Toch, E., Wang, Y., and Cranor, L. F. Personalization and Privacy: A Survey of Privacy Risks and Remedies in Personalization-Based Systems. User Modeling and User-Adapted Interaction 22, 1-2 (2012), 203--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., and Barocas, S. Adnostic: Privacy Preserving Targeted Advertising. NDSS, (2010) http://www.nyu.edu/pages/projects/nissenbaum/papers/adnostic.pdf.Google ScholarGoogle Scholar
  51. Xu, H., Luo, X. (Robert), Carroll, J. M., Rosson, M. B. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decis Support Syst 51, 1 (2011), 42--52. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Let's do it at my place instead?: attitudinal and behavioral study of privacy in client-side personalization

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
        April 2014
        4206 pages
        ISBN:9781450324731
        DOI:10.1145/2556288

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 April 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CHI '14 Paper Acceptance Rate465of2,043submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

        Upcoming Conference

        CHI '24
        CHI Conference on Human Factors in Computing Systems
        May 11 - 16, 2024
        Honolulu , HI , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader